وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Security Administrator Associate Online Training

سرفصل های دوره

This intermediate Microsoft Security Administrator Associate training prepares security professionals to take the MS-500 exam, which is the one required exam to earn the Microsoft 365 Certified: Security Administrator Associate certification.

Plenty of professions and industries depend on certifications to measure the abilities and competence of the people who work in the field. But few industries have as many different technologies, providers and authorities as the IT field. Within IT as a whole, systems administration in particular has many different certifications. A sysadmin who wants to advance in their career needs to demonstrate technological competence in different softwares, hardwares, concepts and capabilities. With this training, you’ll be prepared to certify as a security administrator associate for Microsoft 365, a certification that can prepare you for future roles in security or systems administration.


1 Secure Microsoft 365 Hybrid Environments
  • 1 Intro
  • 2 Azure AD Authentication Options
  • 3 Monitoring Azure AD Connect
  • 4 Troubleshooting Azure AD Connect

  • 2 Secure Identities And Authentication Methods
  • 5 Implementing Azure AD Group Membership
  • 6 Implementing Password Management
  • 7 Implementing MFA Using Conditional Access Policies
  • 8 Managing And Monitoring MFA
  • 9 Passwordless Authentication

  • 3 Implementing Conditional Access
  • 10 Conditional Access Policies
  • 11 Application Based Conditional Access Policies
  • 12 Configuring Access Management
  • 13 Configuring Cloud Application Security

  • 4 Implement Roles And Role Groups
  • 14 What Is Role Based Access
  • 15 Configuring Roles And Role Groups
  • 16 Implement Azure AD Group Membership
  • 17 Auditing Roles For Least Privileged Access

  • 5 Implement Azure AD Identity Protection
  • 18 Introduction To Azure AD Identity Protection
  • 19 User Risk Policies
  • 20 Implementing Sign-in Risk Policies
  • 21 Risk Alerts And Detection
  • 22 Configuring Identity Synchronization

  • 6 Implementing Microsoft Defender For Identity And Threat Protection
  • 23 Microsoft Defender For EndPoint
  • 24 Microsoft Defender For Identity Solutions
  • 25 Integrating Microsoft Defender With Endpoint Manager
  • 26 Attack Surface Reduction
  • 27 EndPoint Security Controls
  • 28 Disk Encryption And Firewall Policies
  • 29 Creating Security Baselines

  • 7 Managing Device and Application Protection
  • 30 Introduction To Device And Application Protection
  • 31 Configuring Microsoft Defender Application Guard
  • 32 Managing Exploit Protection
  • 33 Device Encryption
  • 34 Windows Information Protection
  • 35 Verifying WIP Policy

  • 8 Implementing Microsoft Sentinel and Defender For Office 365
  • 36 Configuring Microsoft Sentinel And Defender For Office 365
  • 37 Getting Started With Microsoft Sentinel
  • 38 Managing And Monitoring With Microsoft Sentinel
  • 39 Creating Office 365 Security Policies
  • 40 Using KQL to Analyze Sign in Activities
  • 41 Conducting Simulated Attacks

  • 9 Manage Sensitive Information
  • 42 What Is A Sensitivity Label
  • 43 Managing Sensitive Information Types
  • 44 Configuring Sensitivity Label Policies
  • 45 Sensitivity Labels Teams, SharePoint ,OneDrive and Office Apps.
  • 46 Using The Activity Explorer

  • 10 Manage Data Loss Prevention
  • 47 Working With DLP
  • 48 Creating DLP Policies In Microsoft 365
  • 49 DLP Full Functionality Test
  • 50 Implementing Endpoint DLP

  • 11 Implement and Manage Microsoft Cloud App Security
  • 51 Microsoft Defender For Cloud Apps
  • 52 Configuring Mass Download Monitoring Policy
  • 53 Review And Interpret Cloud App Alerts
  • 54 Connecting Cloud Apps to Microsoft Defender.
  • 55 Log and Snapshot Reports

  • 12 Manage Data Governance And Retention
  • 56 Configuring Data Retention Labels
  • 57 Data Classification
  • 58 Creating Retention Policies
  • 59 Setting Up A Litigation Hold
  • 60 Records Management
  • 61 Microsoft 365 Retention Policies

  • 13 Managing Regulatory Compliance
  • 62 Planning Compliance Solutions
  • 63 Creating Compliance Assessments
  • 64 Communication Compliance Policies
  • 65 Creating Data Loss Prevention Policies
  • 66 Creating DSR Cases for GDPR Compliance
  • 67 Service Assurance

  • 14 Manage Insider Risk Solutions In Microsoft 365
  • 68 Introduction to Insider Risk Solutions In Microsoft 365
  • 69 Managing Customer Lockbox
  • 70 Implementing Customer Lockbox
  • 71 Managing Communication Compliance
  • 72 Verifying Communication Compliance
  • 73 Implementing Insider Risk Management Policies
  • 74 Creating An Insider Risk Policy
  • 75 Implementing Information Barrier Policies

  • 15 Discover And Respond To Microsoft 365 Compliance Queries
  • 76 Working With eDiscovery
  • 77 Using eDiscovery Content Search
  • 78 Deleting Malicious Emails
  • 79 Creating Audit Retention Policies
  • 80 Usage Reports
  • 81 Insider Risk Management
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    مدرس:
    شناسه: 7400
    حجم: 2366 مگابایت
    مدت زمان: 730 دقیقه
    تاریخ انتشار: 13 اسفند 1401
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید